An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: talos
Published: 2017-03-29T00:00:00
Updated: 2022-04-19T19:17:22
Reserved: 2016-10-26T00:00:00
Link: CVE-2016-9042
JSON object: View
NVD Information
Status : Modified
Published: 2018-06-04T20:29:00.417
Modified: 2023-11-07T02:36:42.027
Link: CVE-2016-9042
JSON object: View
Redhat Information
No data.
CWE